Sciweavers

12493 search results - page 2383 / 2499
» Information Access in the Web
Sort
View
JOLLI
2010
142views more  JOLLI 2010»
14 years 12 months ago
Towards a Type-Theoretical Account of Lexical Semantics
After a quick overview of the field of study known as “Lexical Semantics”, where we advocate the need of accessing additional information besides syntax and Montaguestyle sema...
Christian Bassac, Bruno Mery, Christian Retor&eacu...
KES
2010
Springer
14 years 12 months ago
SceneMaker: Multimodal Visualisation of Natural Language Film Scripts
Abstract. Producing plays, films or animations is a complex and expensive process involving various professionals and media. Our proposed software system, SceneMaker, aims to faci...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...
PERCOM
2010
ACM
14 years 12 months ago
The co-evolution of taxi drivers and their in-car navigation systems
In the recent years, the massive use of in-car navigation systems has symbolized the emergence of location-based services for wayfinding. This market success creates the opportunit...
Fabien Girardin, Josep Blat
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
14 years 11 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
ICISS
2010
Springer
14 years 11 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
« Prev « First page 2383 / 2499 Last » Next »